By Topic

Research on credible start-up and I/O access control of embedded Linux based on trusted computing

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Jin Guo ; Inst. of Astronaut. & Aeronaut., Univ. of Electron. Sci. Technol. of China, Chengdu, China ; Bo Li

With the continuous increase of embedded system hacking, the security of system booting and I/O port is facing new challenge. Aiming at solving these problems, two secure designs that can enhance the security performance of start-up process and I/O port access control of embedded Linux is presented in this paper. Integrating Linux kernel security mechanism and security storage function of TPM (Trusted Platform Module) efficiently, two mechanisms are provided to expand security services which are not only credible booting, but also I/O access control mechanism with the support of safe file system to strengthen the security protection of system sensitive data. Two designs are robust through hardware-based protection and underlying security support relying on TPM chip so as to resist the illegal invasion through the test of booting and I/O control.

Published in:

Mechatronics and Automation (ICMA), 2011 International Conference on

Date of Conference:

7-10 Aug. 2011